Results 61 to 70 of about 164 (126)
Feistel Ciphers with L 2-Decorrelation [PDF]
Recently, we showed how to strengthen block ciphers by decorrelation techniques. In particular, we proposed two practical block ciphers, one based on the GF(2n)-arithmetics, the other based on the x mod p mod 2n primitive with a prime p = 2n(1 + δ). In this paper we show how to achieve similar decorrelation with a prime p = 2n(1 - δ).
openaire +1 more source
AKF: A key alternating Feistel scheme for lightweight cipher designs
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Karakoc, F. +2 more
openaire +2 more sources
The growth of billions of devices functioning in resource‐constrained situations in the Internet of Things (IoT) era poses serious security issues. As a result of their limited processing power efficiency, memory, and battery life, traditional cryptographic algorithms like elliptic curve cryptography (ECC), Rivest–Shamir–Adleman (RSA), and Advanced ...
Nahom Gebeyehu Zinabu +4 more
wiley +1 more source
Design Trends and Comparative Analysis of Lightweight Block Ciphers for IoTs
This paper provides a comprehensive survey of 58 lightweight block ciphers (LWBCs) introduced between 2018 and 2025, designed specifically for securing resource-constrained environments such as the Internet of Things (IoTs).
Safia Meteb Al-Nofaie +2 more
doaj +1 more source
Multi‐Scale Soil Salinization Dynamics From Global to Pore Scale: A Review
Abstract Soil salinization refers to the accumulation of water‐soluble salts in the upper part of the soil profile. Excessive levels of soil salinity affects crop production, soil health, and ecosystem functioning. This phenomenon threatens agriculture, food security, soil stability, and fertility leading to land degradation and loss of essential soil ...
Nima Shokri +2 more
wiley +1 more source
A literature review on V2X communications security: Foundation, solutions, status, and future
The article first introduces the development history of the past Internet of Vehicles(IoV), summarizes some common V2X security threats, describes the development and application of the SM commercial algorithm in recent years, and finally, statistics and introduces the part of the development process of the security protocols currently used in IoV ...
Zuobin Ying +3 more
wiley +1 more source
Links between Quantum Distinguishers Based on Simon’s Algorithm and Truncated Differentials
In this paper, we study the quantum security of block ciphers based on Simon’s period-finding quantum algorithm. We explored the relations between periodic functions and truncated differentials. The basic observation is that truncated differentials with
Zejun Xiang +7 more
doaj +1 more source
Research on Block Cipher Technology [PDF]
With the rapid advancement of information technology, Humanity will enter the era of the Internet of Things, with billions of IoT devices connected to the network, and network attacks targeting user privacy, network environment, etc.
Yin Yuanhao
doaj +1 more source
Integral attack on MIBS block cipher
The security of the block cipher MIBS against integral attack was analyzed and a 5-round distinguisher of MIBS was founded. Considering the equivalent structure of Feistel structure and the relation of master key and round key in the key expansion ...
Zhi-shu PAN +3 more
doaj +2 more sources
Generalized Feistel Ciphers for Efficient Prime Field Masking
A recent work from Eurocrypt 2023 suggests that prime-field masking has excellent potential to improve the efficiency vs. security tradeoff of masked implementations against side-channel attacks, espe- cially in contexts where physical leakages show low noise. We pick up on the main open challenge that this seed result leads to, namely the design of an
Lorenzo Grassi +5 more
openaire +2 more sources

